Path Traversal

Path Traversal

Overview of the Vulnerability

Path traversal uses a server misconfiguration to access hidden files and directories that are stored on the served web application. This can include sensitive operating files, code and data that runs the application, or in some cases, user credentials.

An attacker can leverage the path traversal vulnerability in this application to gain access to system files in a folder of a directory that is not intended for public access.

Business Impact

Path traversal can lead to reputational damage for the business due to a loss in confidence and trust by users. It can also result in data theft and indirect financial losses to the business through the costs of notification and rectifying and breached PII data if an attacker can successfully exfiltrate user data.

Steps to Reproduce

  1. Use a browser to navigate to: {{URL}}

  2. Browse to the URL {{value}}

  3. Change {{parameter}} to {{value}}

  4. It’s now possible to view a new directory that is not intended to be viewed

Proof of Concept (PoC)

The screenshot(s) below demonstrates the path traversal:

{{screenshot}}

Guidance

Provide a step-by-step walkthrough with a screenshot on how you exploited the vulnerability. Your submission must include evidence of the vulnerability and not be theoretical in nature.

Attaching a screenshot of the webpage with the URL bar in view will be sufficient for this report. If identified, do not access or attempt to access sensitive information. Do not access Personally Identifiable Information (PII).

Recommendation(s)

It is recommended to not pass user supplied input to filesystems of the application or API. All user input should be validated before it is processed by the system.

For further information, please see the following resource: https://owasp.org/www-community/attacks/Path_Traversal

Last updated